Computer Networking Fundamentals Final Assessment Flashcards

(20 cards)

1
Q

How do IP addresses and subnet masks work?

A

An IP address is used to identify a device on a network, while a subnet mask is used to determine the network portion of the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the structure of IPv6 addresses?

A

IPv6 addresses consist of eight groups of four hexadecimal digits separated by colons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the structure and format of MAC addresses?

A

MAC addresses are 48-bit numbers typically represented by 12 hexadecimal characters.

MAC addresses are 48-bit numbers typically represented by 12 hexadecimal characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between physical and logical addresses in networking?

A

Physical addresses are unique identifiers assigned to devices at the data link layer of the OSI model, while logical addresses are unique identifiers assigned to devices at the network layer of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the primary function of a router in network topology?

A

Filtering and forwarding network traffic.

The primary function of a router in a network is to filter and forward network traffic between different networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are logical ports?

A

Numeric identifiers used by network protocols to uniquely identify applications or services running on a host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the advantages of wireless networks?

A

Easy mobility, reduced cabling costs, and flexibility in device placement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the NTP protocol?

A

To synchronize time between network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary purpose of the initial device configuration process on Cisco IOS devices?

A

To establish network connectivity and basic settings for the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three violation modes in Cisco switches and their corresponding actions?

A

Protect mode drops packets from unauthorized MAC addresses, restrict mode sends an SNMP trap to the network administrator, and shutdown mode disables the port after multiple violation attempts.

In Cisco switches, protect mode drops packets from unauthorized MAC addresses, restrict mode sends an SNMP trap to the network administrator, and shutdown mode disables the port after multiple violation attempts. These violation modes provide different actions to handle unauthorized access attempts on switch ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose and function of MAC addresses in computer networking?

A

They provide a unique identifier for devices on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the process of configuring and verifying a standard access control list (ACL) on a router?

A

Configure the ACL by defining permit or deny statements based on IP addresses and verify its effectiveness through monitoring network traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cisco IOS analyzes the device’s logging and debugging output for any indications of errors or abnormal behavior.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of a standard Access Control List (ACL) and what are its limitations?

A

The purpose of a standard ACL is to control access to specific network services and resources based on the source IP address. Its limitations include the inability to filter traffic based on destination IP addresses and port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the associated codes is used for directly connected devices in a routing table?

A

C

The associated code “C” is used in a routing table to indicate directly connected networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The IPs 192.168.2.3/24 and 192.61.123.1/24 are in the same subnet.

17
Q

Extended access control lists (ACLs) filter packets based on which attributes?

A

Source and destination IP addresses
Source and destination Layer 4 protocols (UDP and TCP)
Protocol type or number, e.g., IP, HTTPS, 80, etc.

18
Q

What is one advantage of the TCP/IP model over the OSI model?

A

Provides a standardized reference model for network communication, allows for interoperability among different vendors’ networking equipment and protocols.

19
Q

In Cisco ACLs (Access Control Lists), the order in which access control entries (ACEs) are applied matters, with ACEs evaluated from top to bottom, and the first matching ACE determining the action for the traffic.

20
Q

The OSI model has 7 layers, while the TCP/IP model has 4 layers. The OSI model provides a standard reference model for network communication, while the TCP/IP model is a protocol suite used for internet communication.